Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Active Directory authentication and kerberos timeout



I recently set up a CentOS 5.4 server to bind to Active Directory for
authentication,
and it works fine for 24 hours. But I can't get the server to remain joined
permanently.  When the kerberos ticket expires every 24 hours, the
server loses its
trust relationship until I renew the ticket.

How do I get the server to keep the trust relationship permanently?



# krb5.conf

[libdefaults]
 default_realm = US.EAS.LOCAL
 dns_lookup_realm = false
 dns_lookup_kdc = false
 ticket_lifetime = 24h
 forwardable = yes

[realms]
 US.EAS.LOCAL = {
  kdc = wes-dc01.us.eas.local:88
  admin_server = wes-dc01.us.eas.local:749
  default_domain = wes-dc01.us.eas.local
 }

[domain_realm]
 us.eas.local = US.EAS.LOCAL
 .us.eas.local = US.EAS.LOCAL



# smb.conf

   workgroup = WES
   password server = wes-dc01.us.eas.local
   realm = US.EAS.LOCAL
   security = ads



# kinit
# net ads join -u Administrator-TPNy1LyYxJKlP7NgNAbZLA at public.gmane.org




-- 
John Abreau / Executive Director, Boston Linux & Unix
AIM abreauj / JABBER jabr-iMZfmuK6BGBxLiRVyXs8+g at public.gmane.org / YAHOO abreauj / SKYPE zusa_it_mgr
Email jabr-mNDKBlG2WHs at public.gmane.org / WWW http://www.abreau.net / PGP-Key-ID 0xD5C7B5D9
PGP-Key-Fingerprint 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org